A device, method, and system are disclosed for establishing wireless communications between communications devices comprising respective magnets and magnetic sensors each located on first and second communications device and aligned such that a magnet on the first communications device is aligned with a magnetic sensor on the second communications device and a magnet on the second communications device is aligned with a magnetic sensor on the first communications device. In response, a Near field communications (nfc) circuit contained in each of the first and second communications devices is activated and data exchanged between the first and second communications devices using a nfc communications protocol.
|
1. A communications device, comprising:
a housing;
a user interface carried by the housing;
radio frequency (RF) circuitry comprising bluetooth circuitry and a processor carried by the housing and coupled to the user interface and RF circuitry;
a Near field communications (nfc) circuit positioned in the housing and connected to the processor for communicating using an nfc communications protocol; and
a magnetic sensor supported by the housing and connected to the processor for sensing a magnetic field from a nfc enabled device and generating a signal to the processor,
wherein the processor is configured to switch on the nfc circuit and activate the nfc circuit and transmit or receive bluetooth configuration data with the nfc enabled device using the nfc communications protocol in response to the signal to establish bluetooth communications with the nfc enabled device,
wherein the nfc circuit is in a lower power state when not switched on,
the bluetooth circuitry being activated after the nfc circuit receives the bluetooth configuration data and receives into the processor from the nfc enabled device data regarding remote operation of the nfc enabled device using nfc communications, and
the processor is operative with the bluetooth circuitry to control the nfc enabled device using the bluetooth communications,
wherein the control of the nfc enabled device by the processor is based on priority rules that identify a first task of a first application of the communications device that is to be performed prior to a second task of a second application of the nfc enabled device.
16. A system for communicating, comprising:
first and second communications devices and each having a processor and a Near field communications (nfc) circuit and bluetooth circuitry connected to the processor for communicating using a nfc communications protocol and bluetooth communications and a magnet and magnetic sensor connected to the processor for sensing a magnetic field from a respective magnet in the other communications device and generating a signal to the processor, wherein the first communications device includes a user interface coupled to the processor, wherein the processor is configured to turn on and activate the nfc circuit for transmitting or receiving bluetooth configuration data using the nfc communications protocol in response to the signal and wherein the nfc circuit is in a lower power state when not switched on, wherein respective magnets and magnetic sensors are aligned for turning on and activating the nfc circuit to exchange bluetooth configuration data between the devices using the nfc communications protocol, the bluetooth circuitry being activated after the nfc circuit receives the bluetooth configuration data and receives into the processor from the second communications device data regarding remote operation of the second communications device, and the processor is operative with the bluetooth circuitry to control the nfc enabled second communications device using the bluetooth communications,
wherein the control of the second communications device is based on priority rules that identify a first task of a first application of the first communications device that is to be performed prior to a second task of a second application of the second communications device.
8. A method for establishing wireless communications between first and second communications devices each comprising radio frequency (RF) circuitry comprising bluetooth circuitry, a Near field communications (nfc) circuit, and processor coupled to the RF circuitry and the nfc circuit, and the first communications device including a user interface coupled to the processor of the first communications device, the method comprising:
aligning respective magnets and magnetic sensors each located on first and second communications devices such that a magnet on the first communications device is aligned with a magnetic sensor on the second communications device and a magnet on the second communications device is aligned with a magnetic sensor on the first communications device;
switching on and activating a Near field communications (nfc) circuit contained in at least one of the first and second communications devices in response to sensing the magnet on the respective other communications device for enabling communication between the first and second communications devices, wherein the nfc circuit in the at least one of the first and second communications devices is in a lower power state when not switched on; and
exchanging bluetooth configuration data between the first and second communications devices using a nfc communications protocol; and
switching on and activating a bluetooth circuit in at least one of the first and second communications devices and negotiating and establishing bluetooth communications between the at least first and second communications devices and receiving into the processor via bluetooth communications from the second communications device data regarding remote operation of the second communications device, and controlling the second communications device from the first communications device using bluetooth communications;
wherein the controlling of the second communications device is based on priority rules that identify a first task of a first application of the first communications device that is to be performed prior to a second task of a second application of the second communications device.
2. The communications device according to
3. The communications device according to
4. The communications device according to
5. The communications device according to
6. The communications device according to
7. The communications device according to
9. The method according to
10. The method according to
11. The method according to
12. The method according to
13. The method according to
14. The method according to
15. The method according to
|
This application relates to the field of communications, and more particularly, to mobile wireless communications devices and related methods that use Near Field Communications (NFC).
Mobile communication systems continue to grow in popularity and have become an integral part of both personal and business communications. Various mobile devices now incorporate Personal Digital Assistant (PDA) features such as calendars, address books, task lists, calculators, memo and writing programs, media players, games, etc. These multi-function devices usually allow users to send and receive electronic mail (email) messages wirelessly and access the internet via a cellular network and/or a wireless local area network (WLAN), for example.
Some mobile devices incorporate contactless card technology and/or Near Field Communication chips. Near Field Communications technology is commonly used for contactless short-range communications based on radio frequency identification (RFID) standards, using magnetic field induction to enable communication between electronic devices, including mobile wireless communications devices. These short-range communications include payment and ticketing, electronic keys, identification, device set-up service and similar information sharing. This short-range high frequency wireless communications technology exchanges data between devices over a short distance, such as only a few centimeters.
As Near Field Communication (NFC) technology becomes more commonplace, it is often used with portable wireless communications devices in association with other short-range wireless communications such as a wireless Bluetooth connection. For example, an NFC connection is often used to establish a wireless Bluetooth connection in which data for establishing the Bluetooth connection is communicated.
Other objects, features and advantages of the present invention will become apparent from the detailed description of the invention which follows, when considered in light of the accompanying drawings in which:
Different embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which various embodiments are shown. Many different forms can be set forth and described embodiments should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope to those skilled in the art. Like numbers refer to like elements throughout.
A drawback of some devices and systems that incorporate NFC and/or Bluetooth circuits is a requirement that the NFC and/or Bluetooth circuits are constantly on. This creates a power-draining circuit. Furthermore, in some cases could, this result in unwanted connections.
A communications device establishes wireless communications between communications devices and a device-to-device communication in one non-limiting example. Respective magnets and magnetic sensors are aligned and each are located on first and second communications devices such that a magnet on the first communications device is aligned with a magnetic sensor on the second communications device and a magnet on the second communications device is aligned with the magnetic sensor on the first communications device. A Near Field Communications (NFC) circuit contained in each of the first and second communications devices and at least one is activated in response to sensing the magnet on the respective other communications device. Data is exchanged between the first and second communications devices using a NFC communications protocol.
In accordance with another aspect, the two communications devices are in physical contact for activating the NFC circuits within respective communications devices. In another aspect, the two communications devices are within a few millimeters for activating the NEC circuits within respective communications devices. In another example, a wireless communications connection is established different than NEC between first and second communications devices based on data exchanged between first and second communications devices.
A personal identification number (PIN) and security key are exchanged between first and second communications devices using NEC for establishing a wireless communications connection in another non-limiting aspect. A wireless communications connection can be established using Bluetooth communications protocol or WiFi communications protocol.
In another aspect, the magnetic sensor uses the Hall Effect sensor located within a respective communications device. A processor can sense voltage variations produced by the Hall Effect to determine that the NEC circuit should be activated.
A communications device includes a housing and a circuit board carried by the housing. Radio frequency (RF) circuitry and a processor are carried by the housing, such as on a circuit board, and operative with each other. A Near Field Communications (NFC) circuit is positioned on the circuit board and connected to the processor for communicating using a NEC communications protocol. A magnetic sensor, such as a Hall Effect sensor, is supported by the housing and connected to the processor for sensing a magnetic field and generating a signal to the processor, and in response, the processor activating the NFC circuit for transmitting or receiving data using NEC communications protocol.
Other method aspects are set forth.
As will be explained in detail below, it is possible for one communications device 20 to establish communication with a passive peripheral by touching the device to a passive magnetic tag (NFC tag in this example), thus initiating a NFC connection with the peripheral. Passive magnetic tag could refer to different devices, including NFC tags or business cardholders or other data storage devices with limited transmit capability. If the tag is blank (for example, a business cardholder), the tag can be programmed in some cases. If the tag is already programmed, the communications device can read information from the tag, which may lead to further action. For example, if the tag is associated with a printer, the communications device can run a print job on the printer, as discussed further below. An advantage of such system is the Hall Effect is entirely passive, which avoids the requirement for the mobile wireless communications device to have the NFC or Bluetooth circuit constantly “on” and thus drawing power. Only when the communications device 20 determines (“sees”) the presence of another magnet such as on another communications device 22 or passive tag, the device 20 will trigger the initiation of a wireless NFC or Bluetooth connection. An additional benefit is that the Hall Effect requires a closer contact than the NFC circuit, meaning that a deliberate “gesture” is required, such as touching the two communications devices together. This avoids accidental or invasive connections when other Bluetooth-enabled devices are in the area. The term tag as used above can include various devices, which typically operate passively instead of operating in an active mode as with the communications devices 20,22.
As illustrated, each communications device 20,22 in this example for a device-to-device communication as shown in
Near Field Communication (NEC) technology is an extension of the ISO 14443 proximity-card standard as a contactless card, RFID standard that incorporates the interface of a smart card and a reader into one device. A NFC device such as a mobile phone or other mobile wireless communications device typically includes an NFC integrated circuit (IC) chip that communicates to such devices as existing ISO 14443 smart cards and readers and other NEC devices and compatible with any existing contactless infrastructure. The NFC IC chips use magnetic field induction where two loop antennas are located near each other and form an air-core transformer. The technology operates on the unlicensed radio frequency ISM band of about 13.56 MHz and has a bandwidth of about 2 MHz. The working distance is usually about 0 to 20 centimeters. A user of the NEC device brings one NEC enabled device close to another NFC enabled device or tag to initiate NEC communication, with data rates ranging from 106 to about 424 kbit/s.
There are different modes of operation. Most mobile wireless communications devices operate in an active communications mode using a modified Miller and 100% amplitude shift keyed (ASK) code unless a passive mode is used in which a Manchester and ASK code is used. Further details are set forth in the Mobile NFC Technical Guidelines, Version 2.0, November 2007 by GSMA, the disclosure of which is hereby incorporated by reference in its entirety.
The “Near Field Communications Interface and Protocol” or “NFCIP-1” or “the NFC protocol” also allows for communication between an initiator device and a target device, when the initiator device and the target device are brought close together. In the example above, the communications device 20 can be an initiator and a printer or business cardholder could be the target device, and operate as a passive device. Magnets could be sensed using the sensor 26 and the NFC circuit in device 20 activated. Detailed information about NFCIP-1 is available in a published standard called ECMA-340, which is available from Ecma International at www.ecma-international.org.
The NFC protocol operates within the globally available and unregulated radio frequency band of 13.56 MHz and has a working distance of up to 20 centimeters. Three data rates are typically available: 106 kilobits per second (kbit/s), 212 kbit/s, and 424 kbit/s. As noted before, multiple modes of communication are currently available. In the passive communication mode, the initiator device provides an electromagnetic carrier field and the target device answers the initiator device by modulating the carrier field. In the passive communication mode, the target device may draw operating power from the carrier field provided by the initiator device. Advantageously, only the initiator device is required to have a power supply. The modulating magnetic field created by the target device could be used for communicating a limited amount of data.
In the active communication mode, both the initiator device and the target device generate their own electromagnetic field, such as in the example using the communications devices 20,22. The initiator device starts the NFCIP-1 communication. The target device can respond to a command received from the initiator device in the active communication mode by modulating the electromagnetic field generated by the target device. Typically, in the active communication mode, both devices require a power supply.
Notably, in the active communication mode, both devices can act as either initiator or target, while this is not the case in the passive communication mode, wherein the device without the ability to create an electromagnetic carrier field cannot be an initiator device and instead becomes the target device.
According to NFCIP-1, responsive to sensing modulation of the initiator electromagnetic carrier field by the target device, the initiator device performs an initial collision avoidance sequence by transmitting an ATR_REQ (attribute request) command to the target device. Responsive to receiving the ATR_REQ (attribute request) command, the target device transmits a response called ATR_RES (attribute response).
Referring again to
As shown in
In operation, a Hall Effect sensor operates similar to a transducer that varies its output voltage in response to changes in magnetic field, and thus, acts as a passive sensor. This type of sensor can be used for proximity sensing when two devices are brought together, such as the devices 20,22 shown in
Bluetooth, on the other hand, is an open wireless protocol that exchanges data over short distances (but longer than NFC) from fixed and mobile devices, creating what is essentially a Personal Area Network (PAN). A wireless Bluetooth connection typically communicates using a frequency-hopping spread spectrum signal and up to 79 different frequencies. In one modulation, it is a Gaussian Frequency-Shift Keying (GFSK) system that can achieve a gross data rate of up to 1 Mb/s. It is short range and is power-class-dependent of up to one meter, ten meters or 100 meters depending on the type of transceiver microchip used in communications devices. Typically, modern communications devices will allow Bluetooth communication of up to 100 meters in non-limiting examples.
A non-limiting example of various functional components that can be used in the exemplary mobile wireless communications device 20 is further described in the example below with reference to
The housing 120 may be elongated vertically, or may take on other sizes and shapes (including clamshell housing structures). The keypad may include a mode selection key, or the device may include other hardware or software for switching between text entry and telephony entry.
In addition to the processing device 180, other parts of the mobile device 100 are shown schematically in
Operating system software executed by the processing device 180 may be stored in a persistent store, such as the flash memory 116, or may be stored in other types of memory devices, such as a read only memory (ROM) or similar storage element. In addition, system software, specific device applications, or parts thereof, may be temporarily loaded into a volatile store, such as the random access memory (RAM) 118. Communications signals received by the mobile device may also be stored in the RAM 118.
The processing device 180, in addition to its operating system functions, enables execution of software applications 130a-130n on the device 100. A predetermined set of applications that control basic device operations, such as data and voice communications 130a and 130b, may be installed on the device 100 during manufacture. A Near Field Communications module 130C is also installed as illustrated.
The NFC communications module 130c as a software module cooperates with the microprocessor 180 through the flash memory 116. The microprocessor 180 operates also with the NFC subsystem 132 that includes a NFC chip 132a and antenna 132b that communicates with another device/tag 133 such as the type shown in
There is also illustrated the magnetic sensor 134 that could be formed as a Hall Effect sensor and is connected to the microprocessor 180. It includes the various components that operate as a Hall Effect sensor, including any necessary coils or other circuits. There is also illustrated a magnet 135 that, in one example, is formed as an electromagnet and operates with the microprocessor to allow a different communications pathway using electromagnetic energy that is changed to correspond to changing data. The electromagnet 135 operates similar to the magnet 24 as shown in the mobile wireless communications device in
An accelerometer 137 and an analog/digital converter 138 are connected to the microprocessor 180 as illustrated and allow another implementation of the NFC automatic tag detection (and automatic peer-to-peer detection). The accelerometer 137 recognizes the tapping of a communications device against a tag or another device, i.e., recognizes the vibrations. Instead of using the Hall effect sensors and magnets to wake up the NFC circuit, the circuit uses tap recognition, for example, as a vibration sensor and accelerometer in this example. It should be understood that when the device is tapped against another object, for example, an NFC tag, a profile is generated as a matter of certain accelerometer parameters being met or exceeded. If the profile is compared against a known tap profile, it will wake the NFC circuit and initiate communication. In other embodiments, the accelerometer could be part of a motion sensor system and other motion sensor systems other than an accelerometer could be used such as a cadence sensor or cadence detection system.
As will be appreciated by persons skilled in the art, an accelerometer is a sensor which converts acceleration from motion (e.g., movement of the communications device or a portion thereof due to the strike force) and gravity which are detected by a sensing element into an electrical signal (producing a corresponding change in output) and is available in one, two or three axis configurations. Accelerometers may produce digital or analog output signals depending on the type of accelerometer. Generally, two types of outputs are available depending on whether an analog or digital accelerometer is used: (1) an analog output requiring buffering and analog-to-digital (A/D) conversion; and (2) a digital output which is typically available in an industry standard interface such as an SPI (Serial Peripheral Interface) or I2C (Inter-Integrated Circuit) interface. The embodiment shown in
The operational settings of the accelerometer, in one example, are controlled using control signals sent to the accelerometer via a serial interface. In one illustrated example, the microprocessor determines the motion detection in accordance with the acceleration measured by the accelerometer. Raw acceleration data measured by the accelerometer, in another example, is sent to the microprocessor via a serial interface where motion detection is determined by the operating system or other software module. In other embodiments, a different digital accelerometer configuration could be used, or a suitable analog accelerometer and control circuit could be used.
In addition, a personal information manager (PIM) application may be installed during manufacture. The PIM is capable of organizing and managing data items, such as email, calendar events, voice mails, appointments, and task items. The PIM application is also capable of sending and receiving data items via a wireless network 141. The PIM data items are seamlessly integrated, synchronized and updated via the wireless network 141 with the device user's corresponding data items stored or associated with a host computer system.
Communication functions, including data and voice communications, are performed through the communications subsystem 101, and possibly through the short-range communications subsystem 120, which are part of RF circuitry contained on a circuit board typically as shown by the outline. The communications subsystem 101 includes a receiver 150, a transmitter 152, and one or more antennae 154 and 156. In addition, the communications subsystem 101 also includes a processing module, such as a digital signal processor (DSP) 158, and local oscillators (LOs) 161 as part of RF circuitry in this example. The specific design and implementation of the communications subsystem 101 is dependent upon the communications network in which the mobile device 100 is intended to operate. For example, the mobile device 100 may include a communications subsystem 101 designed to operate with the Mobitex™, Data TAC™ or General Packet Radio Service (GPRS) mobile data communications networks, and also designed to operate with any of a variety of voice communications networks, such as AMPS, TDMA, CDMA, PCS, GSM, etc. Other types of data and voice networks, both separate and integrated, may also be used with the mobile device 100.
Network access requirements vary depending upon the type of communication system. For example, in the Mobitex and DataTAC networks, mobile devices are registered on the network using a unique personal identification number or PIN associated with each device. In GPRS networks, however, network access is associated with a subscriber or user of a device. A GPRS device therefore typically utilizes a subscriber identity module, commonly referred to as a SIM card, in order to operate on a GPRS network.
When required network registration or activation procedures have been completed, the mobile device 100 sends and receives communications signals over the communication network 141. Signals received from the communications network 141 by the antenna 154 are routed to the receiver 150, which provides for signal amplification, frequency down conversion, filtering, channel selection, etc., and may also provide analog to digital conversion. Analog-to-digital conversion of the received signal allows the DSP 158 to perform more complex communications functions, such as demodulation and decoding. In a similar manner, signals to be transmitted to the network 141 are processed (e.g., modulated and encoded) by the DSP 158 and are then provided to the transmitter 152 for digital to analog conversion, frequency up conversion, filtering, amplification and transmission to the communication network 141 (or networks) via the antenna 156.
In addition to processing communications signals, the DSP 158 provides for control of the receiver 150 and the transmitter 152. For example, gains applied to communications signals in the receiver 150 and transmitter 152 may be adaptively controlled through automatic gain control algorithms implemented in the DSP 158.
In a data communications mode, a received signal, such as a text message or web page download, is processed by the communications subsystem 101 and is input to the processing device 180. The received signal is then further processed by the processing device 180 for an output to the display 160, or alternatively to some other auxiliary I/O device 106. A device user may also compose data items, such as e-mail messages, using the keypad 140 and/or some other auxiliary I/O device 106, such as a touchpad, a trackball, a trackpad, a rocker switch, a thumb-wheel, or some other type of input device. The composed data items may then be transmitted over the communications network 141 via the communications subsystem 101.
In a voice communications mode, overall operation of the device is substantially similar to the data communications mode, except that received signals are output to a speaker 110, and signals for transmission are generated by a microphone 112. Alternative voice or audio I/O subsystems, such as a voice message recording subsystem, may also be implemented on the device 100. In addition, the display 160 may also be used in voice communications mode, for example to display the identity of a calling party, the duration of a voice call, or other voice call related information and whether there are NFC communications or a Bluetooth connection.
Any short-range communications subsystem enables communication between the mobile device 100 and other proximate systems or devices, which need not necessarily be similar devices. For example, the short-range communications subsystem may include an infrared device and associated circuits and components as described above, or a Bluetooth communications module to provide for communication with similarly-enabled systems and devices as well as the NFC communications.
In accordance with various embodiments, GSM is an exemplary communications system and uses a radio interface that can have an uplink frequency band and downlink frequency band with about 25 MHz bandwidth, typically subdivided into 124 carrier frequency channels, each spaced about 200 KHz apart as non-limiting examples. Time division multiplexing is usually used to allow about 8 speech channels per radio frequency channel, giving 8 radio time slots and 8 burst periods grouped into what is called a TDMA frame. For example, a channel data rate is typically about 270.833 Kbps and a frame duration of about 4.615 milliseconds (MS) in one non-limiting example. The power output usually varies from about 1 to about 2 watts.
Typically, linear predictive coding (LPC) is used to reduce the bit rate and provide parameters for a filter to mimic a vocal track with speech encoded at about 13 Kbps. Four different cell sizes are typically used in a GSM network, including macro, micro, pico and umbrella cells. A base station antenna is typically installed on a master building above the average rooftop level in a macrocell. In a microcell, the antenna height is typically under the average rooftop level and used in urban areas. Microcells typically have a diameter of about a few dozen meters and are used indoors. Umbrella cells usually cover shadowed regions or smaller cells. Typically, the longest distance for the GSM specification covered by an antenna is about 22 miles depending on antenna height, gain and propagation conditions.
GSM systems typically include a base station subsystem, a network and switching subsystem, and a General Packet Radio Service (GPRS) core network. A subscriber identity module (SIM) is usually implemented in the communications device, for example, the well-known SIM card, similar to a smart card containing the subscription information and phone book of a user. The user typically switches handsets or could change operators by changing a SIM. USIM, RUIN or CSIM and other similar technologies can be used in UMTS or CDMA networks.
The GSM signaling protocol has three general layers. Layer 1 is a physical layer using channel structures above the air interface. Layer 2 is the data link layer. Layer 3 is a signaling protocol, which includes three sublayers. These include a Radio Resources Management sublayer to control the setup, maintenance and termination of radio and fixed channels, including handovers. A Mobility Management sublayer manages the location updating and registration procedures and secures the authentication. A Connection Management sublayer handles general call control and manages supplementary services and the short message service. Signaling between different entities such as the Home Location Register (HLR) and Visiting Location Register (VLR) can be accomplished through a Mobile Application Part (MAP) built upon the Transaction Capabilities Application Part (TCAP) of the top layer of the Signaling System No. 7.
A Radio Resources Management (RRM) sublayer typically oversees the radio and fixed link establishment between the mobile station and an MSE.
It is also possible to used Enhanced Data Rates for GSM Evolution (EDGE), as an enhancement to General Packet Radio Service (GPRS) networks. EDGE typically uses 8 Phase Shift Keying (8 PSK) and Gaussian Minimum Shift Keying (GMSK) for different modulation and coding schemes. A three-bit word is usually produced for every changing carrier phase. A rate adaptation algorithm typically adapts the Modulation and Coding Scheme (MCS) according to the quality of the radio channel and the bit rate and robustness of data transmission. Base stations are typically modified for EDGE use.
As shown in
A Bluetooth connection can be used as a non-limiting example if the cardholder were to include a Bluetooth communications module. The magnetic induction of the Hall Effect is still used to “wake up” another type of wireless connection such as for implementing the Near Field Communications between the device 20 and business cardholder 50 in
Magnetic induction can be used as the initial short-range communication to “wake up” a Near Field Communications circuit. Instead of a permanent magnet, an electromagnet can be used as an example 135 shown in
It should be understood that once a wireless pairing is established such as described relative to
There are some instances, however, in which a potential conflict exists, for example, if a first device as part of a device-to-device pairing was in the Instant Messenger application and the other device is in a calendar application. An issue arises whether an address book exchange occurs first or if a scheduled meeting should be proposed first. There are priority rules that are programmed into the devices. For example, the application software causes the Instant Messenger application to have priority followed by any calendar application, and thus, the address book exchange first occurs followed by a scheduled meeting proposal.
It is also possible for a device mode or application to be automatically selected based upon a wireless pairing. For example, if the portable wireless communications device 20 pairs with a computer running a presentation, the device may automatically enter a “remote control” mode. In another example, the user is presented with configuration options for a coffee maker, for example, in response to a pairing with a tag on the coffee maker having stored data and operable with a processor of the coffee maker. Other options include presenting the user with options to open a car door and start a car in response to pairing with the vehicle or automatically presenting a user with options to control and/or use a personal video recorder (PVR) in response to connection with a PVR that is an IP based connection over WiFi from a remote location. In each instance, of course, the device to be controlled includes an appropriate processor for responding to the device for control. The communications device 20, in one example, also acts as a passive accessory, for example, paying a subway toll when entering the subway or receiving a virtual receipt when checking items out at a store as explained below.
It is also possible to enter a device mode for relaying information about a source entered in response to pairing with a particular system. For example, data related to a retail store is offered when the user interacts with a tag or other device at a store. Ticket and movie information in one example is presented at a movie theater when a tag outside the theater is touched, or offers such as coupons are presented in certain locations when a tag is touched. Music, video or photographs are, in another example, presented or shared through the device in response to pairing with a stereo or television. In one example, initiation occurs via a user clicking on a notification, such as a notification for “show now” or perhaps the content is logged where the user chooses what images he or she wants to see. It is possible that the currently selected image is the one shown by default.
Information about the user's walk, in another example, is presented in response to pairing with a shoe that includes a pedometer, and storage space on the shoe is freed for further data. As noted before, in another example, PIN numbers and encryption keys are established and transmitted using Near Field Communication as a set-up communication for implementing a Bluetooth connection (or WiFi) as described before. In one example, a torrid is created that is split and a module driven through a Bluetooth chip and used as an Auto-BAHN signal with millimeter accuracy in positioning from GNSS. Some information is received back because of the control over a charging chip. A visual interface is available with the trigger to connect and establish an automatic pairing and connection as a “tactile action.” It is also possible to have a magnet or an RFID module built-in such that both devices conduct a “transmit and receive.”
In accordance with one embodiment, a magnetic sticker contains information or other data about intelligent systems such as data relating to an IP address, a printer name, Bluetooth Service Set Identifier (SSID) or security key. The Hall Effect, in one example, switches on communication between both devices, which accomplishes a “transmit and receive” to determine what connection each is trying to establish. The devices determine what protocol and technology each is using and negotiate and establish the desired connection. Logical rules or communication protocols are shared, for example, in a photograph application in which another device is touched and automatic downloading of photographs occurs.
In one example, magnetic tags operate as location stickers with stored data and are positioned throughout an office and each having different functions to be implemented in the device as explained in detail below. Such tags have been generally called RFC tags. These location stickers are similar to the magnetic tags and termed stickers because they are “stuck” at different locations, perhaps even by an adhesive or tape or other permanent or semi-permanent means. If an individual walks into a conference room, the individual touches their device to a tag and the portable wireless communications device profile can be switched into a “silent” mode perhaps for an hour depending on how the tag or location sticker is programmed. When a user's device enters an office, it is possible to touch the location sticker and obtain an instant messenger application interface or call forwarding from the device to a desk phone. Thus, some of the user interface applications that are typically performed manually are accomplished automatically in a single “gesture” by someone implementing the gesture and touching their device 20 to the sticker and the device is set. A user does not have to visually look at the screen, but performs the gesture and touches the location sticker or other magnetic tag with their device. Other applications using the “touch” gesture determine signal strength and adjust communications devices and implement cost control for communication.
For example, it is possible that the phone enters a “silent” mode since the user will be in their cubicle and there is no need for the communications device to enter a ringing mode. The same occurs if someone enters the conference room and touches the tag 230 at the conference room entrance with their device. Also, if someone who does not use the cubicles touches the tag 230 located at the cubicle space between the two cubicles, then it gives a location and what type of office they are walking through such as the Design Center as illustrated and printed on the cubicle wall. The speaker 220 is illustrated, in one example, and a user touches the tag 230 with their communications device and downloads or uploads music to cause music to be played in the speaker. The tags 230 in each of the cubicles are touched to activate a calendar program, for example. If the tag 230 at a computer is touched, then the computer, in one example, is operated and starts running a presentation or the device automatically enters a “remote control” mode for controlling the computer through the communications device, such as using Bluetooth or WiFi.
It is possible by touching the tag 230 in a cubicle that the user is presented with configuration options, for example, for operating a coffee maker at their desk in response to pairing with the coffee maker. If the tag 230 at the printer 210 is touched, then the printer 210, in an example, is instructed to print a certain document such as by causing a Bluetooth or WiFi connection between the device and printer. If the photo imager tag 230 is touched, the photo imager 212 could receive photos from the communications device and begin printing photographs. These are only non-limiting examples of how the tags 230 are used to establish functions, such as activating the NFC circuit, and exchanging protocol information or other data and causing the device to enter a Bluetooth, WiFi, silent or other device function.
It should be understood in one example that the shape on the device and the shape of the sticker or tag 230 are configured similarly and the magnet touched in an appropriate location to facilitate functionality. Other functions are possible such as an address book exchange based on device-to-device pairing when one device is in the instant manager application. The scheduling of a meeting in another example is proposed in response to a device-to-device pairing when in the calendar application or when entering the conference room. Meeting schedules and calendar applications are brought up automatically to discuss at a meeting. Other possibilities include the user with options to open a car door and start a car in response to pairing with a vehicle if a tag is located on a vehicle, or automatically present the user with options to control and/or use a personal video recorder (PVR) in response to connection with a personal video recorder. This is an IP based connection over WiFi from a remote location in one example. The device, in another example, also acts as a passive accessory such as paying a subway toll when entering the subway or receiving a virtual receipt when checking out at a store.
The location mode, in one example, applies to the office environment in
Common devices in an office, such as a telephone or computer, are tagged as shown in
The tag is also referred to as a magnetic tag and a sticker and includes a mounting member 332 as illustrated. This mounting member 332 could be an adhesive tape, a Velcro attachment or other adhesive or magnetic attachment (if the supporting surface is metallic). There are Type 1, Type 2, Type 3 and Type 4 tags with functionality that in different examples are implemented. Some tags are read-only as used and others are read/write. In certain examples, some of the tags are single-state and are read-only. Tags have memory capacity in some examples of 96 bytes plus 6-byte OTP plus 2 bytes metal ROM. Others are 48 bytes and some are 1 Kbyte and others variable. Other examples of tags are lockable to read-only and some include security for a 16 or 32-byte digital signature in another example. A magnet 334 is illustrated and configured to activate the NFC circuit in a communications device when placed in the “kiss” configuration with each other. The data store 336 is illustrated. The housing 338 supports the magnet 334 and carries the magnet. The magnet is configured to be magnetically sensed by a magnetic sensor carried by the communications device to activate the NFC circuit within the communications device and communicate using an NFC communications protocol. The data store 336 stores data regarding a function of the communications device to be magnetically coupled by the magnet. The data store is configured to be read by the communications device using an NFC communications protocol after the NFC circuit had been activated. The tag is mounted within the workspace to interact based on instructions stored within the data store regarding the function of the communications device. The data store 336 could be formed as ROM or other storage as known and engage with other circuitry or other programmable devices in some examples. The magnet can be positioned and configured at different locations to engage the magnetic sensor on a communications device and operate to activate the NFC circuit in the communications device such that data in the data store can be read and used by the communications device.
The tag or sticker, in one example, is formed as a shape that is recognizable by the communications device. For example, the tag is formed as a geometric shape with the magnet configured or positioned at a predetermined location on the tag or sticker based on the geometric shape. The communications device has its magnetic sensor oriented such that the magnet on the tag or sticker aligns with the magnetic sensor on the communications device. The tag or sticker is configured such that the communications device is positioned against the tag or sticker in a certain orientation to enable the NFC circuit. In another example, reference marks are included on both the tag or sticker and the communications device such that the communications device is aligned with the tag or sticker using the reference marks in order to enable the NFC circuit. In
Similar examples are accomplished with a tag 530 embedded in a car stereo at the manufacturer or a third party Bluetooth car kit that is a tag with pre-programmed conductivity data. A tag is added to an existing Bluetooth stereo and writes the conductivity data to the tag using the communications device 500 in a kiss gesture. For example, in the speaker 220 (FIG. 20), it is possible to write conductivity data to its tag using the communications device. This gives a user control over connecting and disconnecting to a car system. In some cases, automatic conductivity is not desired. The Bluetooth does not have to be active on the communications device. The act of scanning the tag in a kiss gesture launches the Bluetooth and establishes the connection. The kiss tag, in one example, is scanned to change user profiles, connect a media player through the stereo speakers, and achieve active hands-free phone functionality.
The accelerometer 621 implements NFC automatic tag detection (and automatic peer-to-peer detection). The accelerometer 621 recognizes the tapping of a device against the tag 660 of the cardholder 650 or similar passive device, i.e., recognizes the vibrations. Instead of using the Hall effect sensors and magnets to wake up the NFC circuit, the circuit uses tap recognition as a vibration sensor and accelerometer in this example. It should be understood that when the device is tapped against another object, for example, the NFC tag 660, a profile is generated as a matter of certain accelerometer parameters being met or exceeded. If the profile is compared against a known tap profile, it will wake the NFC circuit and initiate communication.
As noted before, the communications device 620 includes the accelerometer 621. The accelerometer 621 could be formed as a sensor based upon piezoelectric elements. The accelerometer 621 in one example includes a microelectomechanical system (MEMS), such as a capacitive accelerometer. Other accelerometers, including piezoelectric, piezoresistive and gas-based accelerometers, are used. By way of example, in one embodiment the accelerometer is a LIS3L02AQ tri-axis analog accelerometer from STMicroelectronics of Geneva, Switzerland. In some embodiments, a single integrated device is used, for example the LIS3L02DQ tri-axis accelerometer with I2C or SPI interface from STMicroelectronics. The selection of an appropriate accelerometer as a vibration sensor, in one example, is based upon the frequency response range and the sensitivity response of the communications device during tapping.
A dual axis accelerometer is used in one example and outputs an x-axis signal and a y-axis signal. A tri-axis device, in one example, outputs signals for orthogonal x-, y-, and z-axes. The output signals are analog voltages proportional to accelerative force in the axis direction. For example, at least one tri-axis accelerometer outputs a voltage that corresponds to a range of positive and negative linear accelerations of 1.7 g. The accelerometer in an example embodiment includes various filters, signal conditioners, etc., for conditioning the output signals.
Many modifications and other embodiments of the invention will come to the mind of one skilled in the art having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is understood that the invention is not to be limited to the specific embodiments disclosed, and that modifications and embodiments are intended to be included within the scope of the appended claims.
Griffin, Jason T., Fyke, Steven H.
Patent | Priority | Assignee | Title |
10284026, | Sep 25 2017 | Canon Kabushiki Kaisha | Power supply device that supplies power to power receiving device in contactless manner, method of controlling power supply device, and storage medium |
10786395, | Feb 19 2020 | Pleiotek | Apparatus for processing healthcare data and storing and transmitting large amounts of data via a bandage or sticker |
10869805, | Mar 21 2014 | FRUIT INNOVATIONS LIMITED | System and method for providing navigation information |
10959187, | Oct 04 2018 | Casio Computer Co., Ltd. | Wireless communication apparatus, wireless communication method, and recording medium |
11011258, | Feb 19 2020 | Pleiotek | Systems and methods for data processing and performing structured and configurable data compression |
11013639, | Feb 19 2020 | Pleiotek | Apparatus for processing healthcare data and storing and transmitting large amounts of data via a bandage or sticker |
11177027, | Feb 19 2020 | Pleiotek | Systems and methods for data processing and performing structured and configurable data compression |
11264134, | Feb 19 2020 | Pleiotek | Wearable data storage and transmission device for processing sensor data |
11620461, | Feb 19 2020 | Pleiotek | Wearable data storage and transmission device for processing sensor data |
11678152, | Feb 19 2020 | Pleiotek | Wearable data storage and transmission device for processing sensor data |
9961480, | Apr 10 2014 | Harman International Industries, Incorporated | Automatic speaker setup |
Patent | Priority | Assignee | Title |
5491412, | Jan 24 1994 | Optek Technology, Inc. | Security circuit with magnetic proximity sensor having a magnetic settable and electrical resettable latched output |
20040203381, | |||
20050222961, | |||
20060073819, | |||
20060148404, | |||
20070095892, | |||
20070124503, | |||
20070156436, | |||
20070165863, | |||
20070176903, | |||
20070197261, | |||
20070239981, | |||
20070266131, | |||
20080012706, | |||
20080191892, | |||
20110070826, | |||
20110070827, | |||
20110070828, | |||
20110070829, | |||
20110070834, | |||
20110070837, | |||
EP1239630, | |||
WO2007112787, | |||
WO2006040651, | |||
WO2006109032, | |||
WO2008049190, | |||
WO2008059460, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 24 2009 | BlackBerry Limited | (assignment on the face of the patent) | / | |||
Oct 08 2009 | GRIFFIN, JASON T | Research In Motion Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023357 | /0307 | |
Oct 08 2009 | FYKE, STEVEN H | Research In Motion Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 023357 | /0307 | |
Jul 09 2013 | Research In Motion Limited | BlackBerry Limited | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 034030 | /0941 | |
May 11 2023 | BlackBerry Limited | Malikie Innovations Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 064104 | /0103 | |
May 11 2023 | BlackBerry Limited | Malikie Innovations Limited | NUNC PRO TUNC ASSIGNMENT SEE DOCUMENT FOR DETAILS | 064270 | /0001 |
Date | Maintenance Fee Events |
Mar 27 2020 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Mar 12 2024 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Sep 27 2019 | 4 years fee payment window open |
Mar 27 2020 | 6 months grace period start (w surcharge) |
Sep 27 2020 | patent expiry (for year 4) |
Sep 27 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Sep 27 2023 | 8 years fee payment window open |
Mar 27 2024 | 6 months grace period start (w surcharge) |
Sep 27 2024 | patent expiry (for year 8) |
Sep 27 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Sep 27 2027 | 12 years fee payment window open |
Mar 27 2028 | 6 months grace period start (w surcharge) |
Sep 27 2028 | patent expiry (for year 12) |
Sep 27 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |